But is what they implement secure?

We added lots of appendices to TLS 1.3 to help authors of under standards
understand what they had to say to get a secure result.

Adding unactionable mitigations doesn't help anyone including the authors
of the other documents you think will define this.

On Tue, Sep 24, 2024, 2:19 AM Kristina Yasuda <yasudakrist...@gmail.com>
wrote:

> SD-JWT document has a clearly defined scope and one can implement
> “something useful”that is meant to be in scope by reading only SD-JWT
> document.
>
> Also please see my other response about SD-JWT not being meant only for
> issuer-holder-verifier model. There might be usages of SD-JWT outside that
> model that do not need batch issuance. Like, theoretically, using sd-JWT as
> a content of an access token for whatever reason.
>
> Once again, “what we can do is to add a text saying more clearly that the
> details of batch issuance are defined elsewhere and what kind of details
> need to be defined in that document”.
>
>
> On Tue, Sep 24, 2024 at 11:10 AM Dick Hardt <dick.ha...@gmail.com> wrote:
>
>> I understood your point. :)
>>
>> As a reader, I had no idea I was supposed to look elsewhere for guidance
>> on either unlinkability, explicit typing, or decoy digests.
>>
>> My other point is the document should stand on its own and not require
>> other documents to do something useful.
>>
>> On Tue, Sep 24, 2024 at 10:01 AM Kristina Yasuda <
>> yasudakrist...@gmail.com> wrote:
>>
>>> And my point is that SD-JWT document is a wrong place to look for such
>>> actionable language. The intention is not and should not be to define a
>>> stand alone batch issuance protocol in SD-JWT document.
>>>
>>> What we can do is to add a text saying more clearly that the details of
>>> batch issuance are defined elsewhere and what kind of details need to be
>>> defined in that document.
>>>
>>> Best,
>>> Kristina
>>>
>>>
>>>
>>> On Tue, Sep 24, 2024 at 9:22 AM Dick Hardt <dick.ha...@gmail.com> wrote:
>>>
>>>> My feedback is that the current language on batch issuance is not
>>>> actionable, and that this document should stand on its own
>>>>
>>>> If the reader is supposed to take guidance from other documents, then
>>>> you should refer to those other documents, but I would have that in
>>>> addition to specific guidance.
>>>>
>>>> On Mon, Sep 23, 2024 at 10:03 PM Kristina Yasuda <
>>>> yasudakrist...@gmail.com> wrote:
>>>>
>>>>> > there is no guidance on how many to issue, nor how a holder chooses
>>>>> when to reissue the same ones
>>>>> > the question about users randomly selecting some to store and some
>>>>> to reject.
>>>>>
>>>>> These are great points, however, just like JWT/JWS specifications do
>>>>> not define how to manage the lifecycle of those, SD-JWT document is
>>>>> not a right place to discuss them. What you call a "hack" is not
>>>>> meant to be fully specified in SD-JWT document itself. Please review
>>>>> documents such as OpenID4VCI to improve various aspects of
>>>>> batch (re)issuance.
>>>>>
>>>>> On another note, and not sure this was your original point, but I can
>>>>> recall that originally, we had a text in the document that there are other
>>>>> ways to achieve verifier/verifier unlinkability, other than batch 
>>>>> issuance,
>>>>> mainly using advanced cryptography (aka ZKPs). Then, upon receiving
>>>>> feedback that such text is not really actionable or implementable, because
>>>>> it was not well established how to use ZKP with SD-JWTs, we removed
>>>>> sentences alluding to the mechanisms that are not batch issuance.
>>>>> However, I think that might be changing, looking at the work
>>>>> cryptographers at Google have been demonstrating recently. I think we are
>>>>> eagerly waiting for that work to be published and peer reviewed.
>>>>> To sum up, I think we could add back into the SD-JWT document a
>>>>> sentence saying there are ways other than batch issuance to achieve
>>>>> verifier-verifier unlinkability.
>>>>>
>>>>> Best,
>>>>> Kristina
>>>>>
>>>>>
>>>>> On Sat, Sep 21, 2024 at 5:56 PM Dick Hardt <dick.ha...@gmail.com>
>>>>> wrote:
>>>>>
>>>>>> I understand it has become the accepted approach. It still comes
>>>>>> across as a hack, and there is no guidance on how many to issue, nor how 
>>>>>> a
>>>>>> holder chooses when to reissue the same ones.
>>>>>>
>>>>>> I'm amused by the decision to use implicit typing in a disclosure to
>>>>>> save a few bytes, but we will send dozens of credentials to minimize the
>>>>>> chance of linking :)
>>>>>>
>>>>>> On Sat, Sep 21, 2024 at 4:29 PM Daniel Fett <m...@danielfett.de>
>>>>>> wrote:
>>>>>>
>>>>>>> Hi Dick,
>>>>>>>
>>>>>>> Batch credential (not claims) issuing has become the default
>>>>>>> approach to circumvent the inherent limitations of salted-hash-based
>>>>>>> credentials formats. This was neither invented by us, nor is it
>>>>>>> unreasonable to ask implementers to do it. Protocols such as OpenID4VCI
>>>>>>> support it.
>>>>>>>
>>>>>>> -Daniel
>>>>>>> Am 21.09.24 um 06:42 schrieb Dick Hardt:
>>>>>>>
>>>>>>> Is it really going to be practical to batch issue claims, and have
>>>>>>> the holder randomly choose between them on presentation?
>>>>>>>
>>>>>>> As an implementer, what is the right number of claims to be in a
>>>>>>> batch?
>>>>>>>
>>>>>>> This section of the draft reads as a hack to add a new capability
>>>>>>> (unlinkability) to a mechanism that did not have that as a design 
>>>>>>> objective.
>>>>>>>
>>>>>>> This is going to be like the "alg":"null" for SD-JWT. :-)
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to